CVE-2022-22157Incorrect Authorization in Networks Junos OS

Severity
9.3CRITICALNVD
CNA7.2
EPSS
0.2%
top 52.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 19
Latest updateJan 20

Description

A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep Packet Inspection (JDPI) rules and access unauthorized networks or resources, when 'no-syn-check' is enabled on the device. JDPI incorrectly classifies out-of-state asymmetric TCP flows as the dynamic-application INCONCLUSIVE instead of UNKNOWN, which is more permissive, causing the firewall to allow traffic to be forwarded that should have been den

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:NExploitability: 3.9 | Impact: 4.7

Affected Packages2 packages

CVEListV5juniper_networks/junos_os18.418.4R2-S9, 18.4R3-S9+9
NVDjuniper/junos11 versions+10

🔴Vulnerability Details

2
GHSA
GHSA-v3cc-qm43-9jhp: A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep P2022-01-20
CVEList
Junos OS: SRX Series: Traffic classification vulnerability when 'no-syn-check' is enabled2022-01-19

📋Vendor Advisories

1
Juniper
CVE-2022-22157: A traffic classification vulnerability in Juniper Networks Junos OS on the SRX Series Services Gateways may allow an attacker to bypass Juniper Deep P2022-01-19
CVE-2022-22157 — Incorrect Authorization | cvebase